Presentation1.pptx
This report is generated from a file or URL submitted to this webservice on May 8th 2015 16:31:31 (UTC)
Report generated by
Falcon Sandbox v1.72 © Hybrid Analysis
Attention: this analysis ran with the legacy Usermode Monitor. It is highly recommended to use the Kernelmode Monitor.
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Suspicious Indicators 6
-
Environment Awareness
-
Queries volume information
- details
-
"POWERPNT.EXE" queries volume information of "Z:\" at 00094890-00001872-77766268-100007
"POWERPNT.EXE" queries volume information of "Z:\" at 00094890-00001872-77766268-100021
"POWERPNT.EXE" queries volume information of "Z:\" at 00094890-00001872-77766268-100024
"POWERPNT.EXE" queries volume information of "Z:\0252d35ec980b901cdf02f69b5abad7e58b635c2b99ec216fb30cbf83d8d60bc.pptx" at 00094890-00001872-77766268-100027
"POWERPNT.EXE" queries volume information of "Z:\" at 00094890-00001872-77766268-106812
"POWERPNT.EXE" queries volume information of "Z:\share" at 00094890-00001872-77766268-106813 - source
- API Call
- relevance
- 2/10
-
Queries volume information of an entire harddrive
- details
-
"POWERPNT.EXE" queries volume information of "Z:\" at 00094890-00001872-77766268-100007
"POWERPNT.EXE" queries volume information of "Z:\" at 00094890-00001872-77766268-100021
"POWERPNT.EXE" queries volume information of "Z:\" at 00094890-00001872-77766268-100024
"POWERPNT.EXE" queries volume information of "Z:\" at 00094890-00001872-77766268-106812 - source
- API Call
- relevance
- 8/10
-
Queries volume information
-
General
-
Reads configuration files
- details
-
"POWERPNT.EXE" read file "C:\Users\desktop.ini"
"POWERPNT.EXE" read file "%USERPROFILE%\Desktop\desktop.ini"
"POWERPNT.EXE" read file "C:\Users\%USERNAME%\Searches\desktop.ini"
"POWERPNT.EXE" read file "C:\Users\%USERNAME%\Videos\desktop.ini"
"POWERPNT.EXE" read file "C:\Users\%USERNAME%\Pictures\desktop.ini"
"POWERPNT.EXE" read file "C:\Users\%USERNAME%\Contacts\desktop.ini"
"POWERPNT.EXE" read file "C:\Users\%USERNAME%\Favorites\desktop.ini"
"POWERPNT.EXE" read file "C:\Users\%USERNAME%\Music\desktop.ini" - source
- API Call
- relevance
- 4/10
-
Reads configuration files
-
Network Related
-
Found potential URL in binary/memory
- details
- "V.Puj/VPt@@uW$+OOGu$HH@uAA"
- source
- String
- relevance
- 2/10
-
Found potential URL in binary/memory
-
Unusual Characteristics
-
Contains embedded string with suspicious keywords
- details
-
Found suspicious keyword "Put" which indicates: "May write to a file (if combined with Open)"
Found suspicious keyword "Lib" which indicates: "May run code from a DLL"
Found suspicious keyword "Write" which indicates: "May write to a file (if combined with Open)"
Found suspicious keyword "Environ" which indicates: "May read system environment variables"
Found suspicious keyword "Chr" which indicates: "May attempt to obfuscate specific strings" - source
- String
- relevance
- 10/10
-
Installs hooks/patches the running process
- details
-
"POWERPNT.EXE" wrote bytes "21EED4C2" to virtual address "0x2F4115C4" (part of module "POWERPNT.EXE")
"POWERPNT.EXE" wrote bytes "E9231974F2" to virtual address "0x75EB3D01" ("SetUnhandledExceptionFilter@kernel32.dll") - source
- Hooks
- relevance
- 10/10
-
Contains embedded string with suspicious keywords
-
Informative 5
-
General
-
Creates mutants
- details
-
"KYIMEShareCachedData.MutexObject.PSPUBWS"
"KYTransactionServer.MutexObject.PSPUBWS" - source
- Created Mutant
- relevance
- 3/10
-
Loads modules at runtime
- details
-
"POWERPNT.EXE" loaded module "UXTHEME.DLL" at base 74580000
"POWERPNT.EXE" loaded module "OLE32.DLL" at base 76440000
"POWERPNT.EXE" loaded module "MSOSTYLE.DLL" at base 711B0000
"POWERPNT.EXE" loaded module "%WINDIR%\SYSTEM32\MSCTF.DLL" at base 76770000 - source
- API Call
- relevance
- 1/10
-
Loads rich edit control libraries
- details
- "POWERPNT.EXE" loaded module "%COMMONPROGRAMFILES%\Microsoft Shared\office12\riched20.dll" at 67730000
- source
- Loaded Module
-
Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)
- details
- "DecodePointer@KERNELBASE.dll"
- source
- API Call
- relevance
- 1/10
-
Creates mutants
-
Installation/Persistance
-
Dropped files
- details
-
"~$0252d35ec980b901cdf02f69b5abad7e58b635c2b99ec216fb30cbf83d8d60bc.pptx" has type "data"
"546C9B07.wmf" has type "ms-windows metafont .wmf"
"Local Disk (C).LNK" has type "MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, System, Directory, ctime=Tue Jul 14 02:07:54 2009, mtime=Fri May 8 14:32:44 2015, atime=Fri May 8 14:32:44 2015, length=8192, window=hide"
"index.dat" has type "data"
"mso86EE.tmp" has type "ms-windows metafont .wmf"
"mso88E3.tmp" has type "ms-windows metafont .wmf"
"opa12.dat" has type "data" - source
- Dropped File
- relevance
- 3/10
-
Dropped files
File Details
Presentation1.pptx
- Filename
- Presentation1.pptx
- Size
- 3.5MiB (3638929 bytes)
- Type
- pptx office
- Description
- Microsoft PowerPoint 2007+
- Architecture
- WINDOWS
- SHA256
- 0252d35ec980b901cdf02f69b5abad7e58b635c2b99ec216fb30cbf83d8d60bc
- MD5
- ae47dc23de8de696c4bb3022b52cfae3
- SHA1
- db266340ee9a91c377563c15422d29d249ba8a56
Resources
- Icon
Visualization
-
Classification (TrID)
- 97.3% (.PPTX) PowerPoint Microsoft Office Open XML Format document
- 2.6% (.ZIP) ZIP compressed archive
Screenshots
Loading content, please wait...
Hybrid Analysis
Tip: Click an analysed process below to view more details.
Analysed 1 process in total.
- POWERPNT.EXE "C:\0252d35ec980b901cdf02f69b5abad7e58b635c2b99ec216fb30cbf83d8d60bc.pptx" (PID: 1872)
Network Analysis
DNS Requests
No relevant DNS requests were made.
Contacted Hosts
No relevant hosts were contacted.
HTTP Traffic
No relevant HTTP requests were made.
Extracted Strings
Extracted Files
-
Informative 7
-
-
opa12.dat
- Size
- 8.3KiB (8514 bytes)
- Type
- data
- MD5
- d817060aa54296645eb9b583215a0287
- SHA1
- 2d53d6c00e679eb0e203f208478d461d09a28c0c
- SHA256
- 95dadd5399dce4fa4c91d0084646acbe0d27171ebbd64374a5dc48ba95af85f3
-
546C9B07.wmf
- Size
- 3.6KiB (3700 bytes)
- Type
- ms-windows metafont .wmf
- MD5
- 5489015130c1953dfe428f83edba0b30
- SHA1
- 6fee2756540f69f02b504977a1a35aa3e089a03c
- SHA256
- 9e280f85fd66cda1f21499ba2acb2763ed99bd6736963e285e3997da3e7da047
-
mso86EE.tmp
- Size
- 3.6KiB (3722 bytes)
- Type
- ms-windows metafont .wmf
- MD5
- 48f8ca00e9f7a7a2dcb7cc63ad06c6f5
- SHA1
- b39fe838186df6c4cc46214609924dad59888c25
- SHA256
- aaa2312f6d3ed47ca0d3e3c304995c790d650c81cbaa3f24811d04f5d6aec6df
-
mso88E3.tmp
- Size
- 3.6KiB (3722 bytes)
- Type
- ms-windows metafont .wmf
- MD5
- 48f8ca00e9f7a7a2dcb7cc63ad06c6f5
- SHA1
- b39fe838186df6c4cc46214609924dad59888c25
- SHA256
- aaa2312f6d3ed47ca0d3e3c304995c790d650c81cbaa3f24811d04f5d6aec6df
-
Local Disk (C).LNK
- Size
- 317B (317 bytes)
- Type
- MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, System, Directory, ctime=Tue Jul 14 02:07:54 2009, mtime=Fri May 8 14:32:44 2015, atime=Fri May 8 14:32:44 2015, length=8192, window=hide
-
index.dat
- Size
- 130B (130 bytes)
- Type
- data
- MD5
- 0172ddebaa3487b4459ec412b25a2767
- SHA1
- 33611d33df713efdac56f484e7971314625d301d
- SHA256
- 3e2cb2c61c2c3a9ab064c8a180a1a431b982d11b42b09b4276cada221ece191b
-
~$0252d35ec980b901cdf02f69b5abad7e58b635c2b99ec216fb30cbf83d8d60bc.pptx
- Size
- 165B (165 bytes)
- Type
- data
- MD5
- 0009015f034f4055b899b0b4e69df344
- SHA1
- 2d4fe52a52f350da076a497b41d7545cfe04b21e
- SHA256
- d1f504d6f2d10f3e450833a89479f06a31b0820ec05ee00d5443804bb177c442
-
Notifications
-
Runtime
- Not all strings are visible in the report, because the maximum number of strings was reached (5000)